Written by: Jay H. You may think your small business is an unlikely target for cybercriminals. Unfortunately, that isn’t the case. Approximately 43 percent of cybersecurity breaches target small and medium businesses, meaning your organization is in direct sight of attackers. Luckily, you can fight back against hackers and take steps to protect yourself and your organization. Let’s go over
Written by: Jay H. Spyware is an umbrella term for a form of malware (malicious software) that bad actors install on a victim’s computer without their consent. It then spies on the user, steals personal information – including browsing history, login information, and sensitive information – and relays the data to third parties. Spyware is one of the most common
Written by: Jay H. Every business is at significant risk of a cyberattack. Indeed, 42 percent of businesses experienced a cyberattack in the last year, yet many businesses still do not take action to defend themselves. Reducing your firm’s cyberattack risk should be one of your biggest priorities in order to prevent costly breaches. Here are some ways you can
Written by: Jay H. Data breaches are an area of major concern nowadays. Cybercriminals constantly search for new vulnerabilities to exploit and data to steal. However, a shocking report from WordPress security provider PatchStack reveals that nearly 30 percent of flawed WordPress plugins never receive an update. Plugins increasingly vulnerable 2021 experienced a 150 percent increase in the number of
Written by: Jay H. Cybersecurity is a hot topic nowadays. Seemingly every day, there are new headlines of businesses and websites getting hacked. However, did you know your phone is also susceptible to hackers and malefactors? Luckily, you can take steps to improve your device’s security. Here is how to secure your mobile phone. Lock Your Device If your
Written by: Jay H. Every device on your business network poses a threat. Your computers, mobile devices, servers, and even printers are all vectors hackers can use to breach your organization. So, how do you know if suspicious activity occurs? What if attackers compromise a device? Endpoint detection and response (EDR) aims to address these challenges, using continuous monitoring to
Written by: Jay H. A joint security advisory issued by the top cybersecurity agencies reveals the most targeted vulnerabilities by cybercriminals over the past two years. The USA’s Cybersecurity and Infrastructure Security Agency (CISA), the USA’s Federal Bureau of Investigation, the Australian Cyber Security Centre (ACSC), and the United Kingdom’s National Cyber Security Centre (NCSC) also shared details on these security
Written by: Jay H. Hackers waste no time taking advantage of the hype surrounding major events. The announcement of Windows 11, Microsoft’s newest operating system, is no exception, and criminals have already started pushing fake Windows 11 installers laced with malware. Although Windows 11 isn’t officially available for the general public until late 2021, Microsoft has made it available to
Written by: Jay H. According to a new report from a Canadian international managed service provider, manufactured goods producers were the biggest ransomware targets in the first half of 2021. In the recent report issued by the Herjavec Group, 39 percent of victims listed on the data leak websites run by ransomware groups broadly fell into the manufactured goods category.
Written by: Jay H. If you’ve paid any attention to recent news, you’ve likely seen ransomware stories dominating major headlines. The Colonial Pipeline cyber attack is just one example of the devastation a cyberattack can cause. However, many small-medium business (SMB) owners still don’t consider themselves to be at risk despite the abundance of cyberattacks. Unfortunately, this couldn’t be further